The document provides instructions for configuring a wireless access point in repeater mode to extend the range of an existing Wi-Fi network. The steps are to log into the access point's web management interface, select repeater mode, choose universal repeater or WDS repeater, search for and connect to the host network by entering its password, set the LAN IP type or use the default smart IP setting, and relocate the access point halfway between the host and dead zone area.
Hacking : A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking with Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing
The document provides instructions for configuring a wireless access point in repeater mode to extend the range of an existing Wi-Fi network. The steps are to log into the access point's web management interface, select repeater mode, choose universal repeater or WDS repeater, search for and connect to the host network by entering its password, set the LAN IP type or use the default smart IP setting, and relocate the access point halfway between the host and dead zone area.
The document provides instructions for configuring a wireless access point in repeater mode to extend the range of an existing Wi-Fi network. The steps are to log into the access point's web management interface, select repeater mode, choose universal repeater or WDS repeater, search for and connect to the host network by entering its password, set the LAN IP type or use the default smart IP setting, and relocate the access point halfway between the host and dead zone area.
The document provides instructions for configuring a wireless access point in repeater mode to extend the range of an existing Wi-Fi network. The steps are to log into the access point's web management interface, select repeater mode, choose universal repeater or WDS repeater, search for and connect to the host network by entering its password, set the LAN IP type or use the default smart IP setting, and relocate the access point halfway between the host and dead zone area.
WIRELESS N ACCESS POINT N REPEATER MODE, THE ACCESS POINT EXTENDS THE RANGE OF AN EXISTING WI- FI NETWORK. THIS MODE IS SUITABLE WHEN YOU ARE IN A WI-FI DEAD-ZONE OR A PLACE WITH WEAK WIRELESS SIGNAL, AND YOU WANT TO HAVE A LARGER EFFECTIVE RANGE OF THE WIRELESS SIGNAL THROUGHOUT YOUR HOME OR OFFICE. 1. LOG IN THE WEB-BASED MANAGEMENT OF THE ACCESS POINT. FOR DETAILED INSTRUCTION, PLEASE REFER TO HOW TO LOG IN THE WEB-BA SED MANAGEMENT INTERFA CE OF WIRELESS N ACCESS P HERE TAKES TL-WA901ND AS DEMONSTRATION.
2. GO TO QUICK SETUP AND CLICK NEXT TO
START. 3. IF YOU WANT TO CHANGE YOUR LOGIN ACCOUNT, CLICK YES. THEN ENTER YOUR OLD USERNAME AND PASSWORD, THEN A NEW 4. SELECT REPEATER (RANGE EXTENDER) AS OPERATION MODE. CLICK NEXT. 5. SELECT UNIVERSAL REPEATER OR WDS REPEATER. IT’S RECOMMENDED TO CHOOSE UNIVERSAL REPEATER IF YOU ARE NOT SURE WHETHER YOUR HOST AP SUPPORTS WDS. 6. CLICK SURVEY TO FIND YOUR HOST NETWORK AND CLICK CONNECT. ENTER THE HOST NETWORK’S PASSWORD IN THE WIRELESS PASSWORD FIELD, AND THEN CLICK NEXT. 7. SELECT THE LAN IP TYPE OF THE ACCESS POINT OR LEAVE THE DEFAULT SETTING SMART IP FOR MOST CASES, AND THEN CLICK NEXT. 8. CLICK FINISH TO COMPLETE THE CONFIGURATION. 9. RELOCATE THE ACCESS POINT ABOUT HALFWAY BETWEEN YOUR HOST AP AND THE WI-FI DEAD ZONE. THE EXTENDED NETWORK SHARES THE SAME NETWORK NAME AND PASSWORD AS YOUR HOST NETWORK.
Hacking : A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking with Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing